Skip to main content
guest
Join
|
Help
|
Sign In
ACG 6415
Home
guest
|
Join
|
Help
|
Sign In
ACG 6415
Wiki Home
Projects
Recent Changes
Pages and Files
Members
Home
Syllabus - Spring 2018
Schedule - Spring 2018
Class Readings
Class Slides
Access Control Simulation
Course Videos
TYU Solutions
GAO Reports
Security Certifications
Resources
Frameworks & Standards
Threat Statistics
Phishing
Security in the News
Technology Radar
AIS/CPA Exam
Wiki Information
Schedule - Summer D 2015
Edit
9
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Summer D 201 Schedule
Date
Chapter
Coverage
Readings
Assignment
Due Date
05/18/2015
Introduction
Readings
Read the
Threat Environment
articles and be prepared to discuss in class.
05/20/2015
Readings
COSO, COBIT, ERM
Using COSO to Assess IT Controls
(Journal of Accountancy, May 2014)
From the
Frameworks & Standards
page, read:
Internal Control - Integrated Framework (1992)
Internal Control - Integrated Framework (2011 Exposure Draft)
coso_draft_internal control framework.pdf
COSO in the Cyber Age -
COSO in the Cyber Age_FULL_r11.pdf
Details
Download
4 MB
The next two are too long to be covered (or read) but you should at least skim them/read the executive summary.
Enterprise Risk Management - Integrated Framework (2004)
COBIT 5
05/25/2015
No Class
05/27/2015
Chapter 1
The Threat Environment
06/01/2015
Chapter 2
Planning & Policy
We will be discussing an alternative Risk Assessment method OCTAV Alegro, you can read more
here
.
06/03/2015
Module A
Networking Concepts
06/08/2015
Chapter 3
Cryptography
Read the
Cryptography Readings
from the
Class Readings
page
06/10/2015
Chapter 4
Secure Networks
06/11/2015
to
06/14/2015
Exam 1 (Chapter 1-4, Module A, Readings)
06/15/2015
Chapter 5
Access Controls
06/17/2015
Readings
Passwords
Read the required readings from the Password section of the
Class Readings
06/22/2015
Chapter 6
Firewalls
06/24/2015
Chapter 7
Host Hardening
06/29/2015
Chapter 8
Application Security
Read the required Application Hardening articles section of the
Class Readings
07/01/2015
Chapter 9 & 10
Data Protection & Incident and Disaster Response
Cybersecurity's Maginot Line: A real-world assessment of the defense-in-depth model by Mandiant, May 2014
fireeye-real-world-assessment.pdf
Details
Download
2 MB
Access Control Simulation Report
07/08/2015
07/06/2015
No Class
Security in the News
07/08/2015
07/08/2015
No Class
07/13/2015
Class Readings
SOX IT Readings
This article discusses the Board's role in cybersecurity from a governance perspective:
TCB_DN-V6N6-141.pdf
Details
Download
450 KB
(Clarke and Olcott, 2014)Read the required readings from the IT Control and SOX section of the
Class Readings
07/15/2015
Class Readings
SEC Readings and Misc.
Cyberattack's abound yet companies tell SEC losses are few
By
Chris Strohm, Eric Engleman and Dave Michaels
-
Apr 3, 2013)
Companies Hacked by Chinese Didn’t Disclose Attacks to Investors
By
By Chris Strohm, Dave Michaels and Sonja Elmquist - May 21, 2014)
CF Disclosure Guidance: Topic No. 2
S.E.C. (
This guidance provides the Division of Corporation Finance's views regarding disclosure obligations relating to cybersecurity risks and cyber incidents)
SEC Cybersecurity Roundtable Archive Webcast
SEC OCIE Cybersecurity Initiative (April 15, 2014)
Cybersecurity Risk Alert & Appendix - 4.15.14.pdf
Details
Download
295 KB
SEC OCIE Cybersecurity Examination (February 3, 2105)
cybersecurity-examination-sweep-summary.pdf
Details
Download
1 MB
AICPA Top 5 Cybercrimes (2013)
Top-5-CyberCrimes.pdf
Details
Download
5 MB
ERM for cloud computing (COSO)
2012 Chan.pdf
Details
Download
6 MB
07/16/2015
to
07/18/2015
Exam 2 (Chapter 5-10, Readings)
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Summer D 201 Schedule
From the Frameworks & Standards page, read:
to
06/14/2015
to
07/18/2015